Open Access
ARTICLE
Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm
1 SRM University, Delhi-NCR, Sonipat, Haryana, 131029, India
2 Institute of Research and Development, Duy Tan University, Danang, 550000, Vietnam
3 Department of Information Technology, Duy Tan University, Danang 550000, Vietnam
4 Graphic Era Hill University, Dehradun, Uttarakhand, 248171, India
5 Amity University, Haryana, 122412, India
6 Principal Software Lead, Zillow Inc., USA
7 School of Computer Science & Engineering, Faculty of Engineering, SMVD University, Kakryal, Katra, 182320, India
8 Material Science Research Laboratory, Department of Physics, S.V. College, Aligarh, 202001, India
* Corresponding Author: Dac-Nhuong Le. Email:
Computers, Materials & Continua 2021, 67(1), 779-798. https://doi.org/10.32604/cmc.2021.014466
Received 22 September 2020; Accepted 13 November 2020; Issue published 12 January 2021
Abstract
Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) techniques. Algorithms for secure data storage protocol in two phases have been presented. The proposed hybrid protocol endeavors to improve the power of cloud storage through a decrease in computation time and cipher-text size. Simulations have been carried out with Oracle Virtual Box and Fog server used on an Ubuntu 16.04 platform. This grouping of asymmetric and homomorphic procedures has demonstrated enhanced security. Compression usage has helped in decreasing the storage space and computation time. Performance analysis in terms of computation overhead and quality of service parameters like loads of parameters with and without attacks, throughput, and stream length for different modes of block cipher mode has been carried out. Security analysis has been carried out by utilizing the Hardening Index as an audit parameter using Lynis 2.7.1. Similarly, for halting the aforementioned approaches and for regulating traffic, firewall protection has been generated in the chosen hybrid algorithms. Finally, enhancements in the performance of the Paillier and Blowfish hybrid scheme with and without compression compared to the existing schemes using RSA and AES procedures have been demonstrated.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.